Skip to content

OpenEMR Security issue

Notifications You must be signed in to change notification settings

Wezery/CVE-2019-14529

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

CVE-2019-14529

Multiple SQL Injection vulnerability in OpenEMR project

Vulnerable function in file: /openemr/interface/forms/eye_mag/save.php

Conditions : any authorized user

Vulnerable versions: <5.0.2, Fixed in 5.0.2 version.

Description

There are two functions:

  1. "store_PDF", with non filtered variable "encounter",
  2. "canvas", with non two filtered variable "encounter" and "zone".

Both functions use this variables in DELETE sql query without any filtration. Both variables controlled by attacker.

Error messages contains code of SQL queries and SQL error message. It can be used for exploit error-based type of SQL Injection.

Impact

Disclosure of VERY sensitive information, since this software used in medical sphere.

Other

OpenEMR official site

OpenEMR git repo

Patch for this issue

P.S. Special thanks to Brady G. Miller from OpenEMR team for fast response and patches

About

OpenEMR Security issue

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages